Catching Video Pirates: Invisible DNA-Like Fingerprint on Video Assist Law Enforcement

You know when you’re watching a pirated film downloaded from the Internet — there’s no mistaking the fuzzy footage, or the guy in the front row getting up for popcorn. Despite the poor quality, pirated video is a serious problem around the world. Criminal copyright infringement occurs on a massive scale over the Internet, costing the film industry — and the U.S. economy — billions of dollars annually.

Now Dr. Alex Bronstein of Tel Aviv University’s Department of Electrical Engineering has a new way to stop video pirates. With his twin brother Michael and Israeli researcher Prof. Ron Kimmel, he has developed the ultimate solution: treating video footage like DNA.

Sequencing the video genome – “It’s not only members of the animal and plant kingdom that can have DNA,” says Dr. Bronstein, who was inspired by DNA sequencing tools used in bioinformatics laboratories. “If a DNA test can identify and catch criminals, we thought that a similar code might be applicable to video. If the code were copied and changed, we’d catch it.” Continue reading …

Related Posts

Adding Linux Dash as a system service Last week Ivan Mikushin discussed adding system services to RancherOS using Docker Compose. Today I want to show you an example of how to deploy Linu...
Samsung’s Exynos 5 Octa Samsung's Exynos 5 Octa is a star (my opinion) in the mobile processor System-on-Chip (SoC) arena. It is in direct competition with NVIDIA's Tegra 4, ...
Towards a mandatory, always-on and ubiquitous encryption in XMPP networks Now that we know that our online communications are not necessarily private and secure, there is a growing need to have end-to-end encryption built in...
Introducing Distributed Data-structures in R The main goal of the “ddR” package is to provide a simple, generic data-structures, and functions that works across different backends such as R’s “pa...
Aggregating application logs from Docker containers with Loggly Once any application, dockerized or otherwise, reaches production, log aggregation becomes one of the biggest concerns. We will be looking at a number...
Is TrueCrypt dead? Based on the wording of its license, there was always a question mark surrounding the open source-ness of Truecrypt. But that's not the topic of this ...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*